Jamf Connect ZTNA Evaluation Guide
  • 13 Jun 2024
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Jamf Connect ZTNA Evaluation Guide

  • Dark
    Light
  • PDF

Article summary

Summary

After the discussions with your Jamf account team, they will provision access to the Jamf Connect product for purposes of evaluating the capabilities against your needs. Use the following guide to review each feature of Jamf Security Cloud.

Disclaimer

Do not test these features in your production environment. We recommend evaluating Jamf Connect in evaluation environments.

Features of Jamf Connect ZTNA

Utilizing a modern VPN on iOS, iPadOS, macOS, Android, and Windows the Jamf Connect product can gate access to various applications and resources based upon validation of management and security risk level. To review these capabilities, implement the following features within Jamf Security Cloud:

Feature

Description

Scope

Documentation Link(s)

Controlling access to Jamf distributed app

Configuring an access policy for the SaaS application “My IP on a Map” for ZTNA access to map.wandera.com

Global Policy or Group Policy

Adding a new SaaS application

Controlling access to SaaS and custom SaaS applications

Configuring an access policy for any SaaS applications utilizing either pre-built templates or custom

Global Policy or Group Policy

Adding a new SaaS application

End-user / admin Notifications

Notifying end-users of policy blocks via the end-user application and/or the customizable block pages via Jamf Security Cloud.

N/A

Block Pages

Build Dedicated Internet Gateways

Dedicated internet gateways route specified business traffic to the device through Jamf Security Cloud using a pair of IP addresses specific to your environment.

Global Policy or Per-app Policy

Creating a Dedicated Internet Gateway

Access policies for custom enterprise apps

Configuring an access policy for any customer enterprise applications managed by a private network.

Global Policy or Per-app Policy

Add a New Enterprise Application

Device Risk-based Access Controls

Integrating Jamf Security Cloud’s Threat Prevention policy with ZTNA to ensure end-user devices are at appropriate risk level when accessing corporate applications. (Requires the purchase of Jamf Protect)

Global Policy or Per-app Policy

Adding a new SaaS application

Restrict Access when Jamf Trust is disabled

When enabled, the user cannot access the application on their device when the Jamf Trust App is disabled. (Requires the purchase of Jamf Protect)

Global Policy or Per-app Policy

Adding a new SaaS application

Device Management State-based Access Control

Prevent unmanaged devices from accessing the application. (Requires UEM Connect to be enabled in Jamf Security Cloud.)

Global Policy or Per-app Policy

Adding a new SaaS application

Features of Cloud Access Controls

Jamf offers the capability to setup certain compatible cloud providers with access controls to verify that only devices and users with Jamf Connect ZTNA are allowed to communicate with that environment.

This section is optional only if and when you have purchased and using these cloud solutions and want to block access to all other devices. We recommend not implementing any of these controls against production environment.

Feature

Description

Documentation Link(s)

AWS

Set login restrictions when devices need access to corporate AWS resources

AWS Restrict Login Access

Google Workspace

Set login restrictions when devices need access to corporate Google Workspace resources

Google Restrict Login Access

Microsoft 365

Set login restrictions when devices need access to corporate Microsoft 365 environments

M365 Restrict Login Access

Microsoft Exchange ActiveSync

Set login restrictions when devices need access to corporate Exchange servers

Exchange Restrict Login Access

Okta

Set login restrictions when devices need access to Okta

Restrict Access to Okta

Features of Jamf Connect ZTNA Reporting

Reporting on the events related to access rules tested above:

Feature

Description

Documentation Link(s)

Application Usage

Dashboard view of device access to each application defined in the Access Policy.

Zero Trust Network Access Reports

User Activity

Report on what active users are, and which applications they access from their devices

Zero Trust Network Access Reports

Event Logs

Detailed event logs of end-user devices accessing defined corporate applications on a per-request basis.

Zero Trust Network Access Reports

Routing Analytics

Visual representation of all defined Access Policy (corporate app) connections based on user device, number of requests, routes defined, and applications accessed.

Zero Trust Network Access Reports

After review each of these features of Jamf Connect reach back out to your Jamf account team to schedule next steps. Thank you for your time and attention to successfully securing your organization.


Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.